- Subnetting — you choose the IP address ranges
- Routing — route tables determine packet paths
- Firewalls — Security Groups and Network ACLs control traffic
- Gateways — Internet Gateways, NAT Gateways, Virtual Private Gateways, etc.

Key VPC characteristics
- Region-scoped: a VPC exists in a single AWS region and cannot span regions. For example, a VPC in
us-east-1is separate from a VPC inus-east-2. - Isolation by default: resources in different VPCs are isolated. You must explicitly enable connectivity (VPC Peering, Transit Gateway, or an internet gateway plus routing/security).
- Control plane for networking: you design CIDR blocks, subnets, route tables, and firewall rules.


Each AWS region includes a default VPC created automatically. The default VPC typically uses the CIDR block
172.31.0.0/16, comes with default subnets (one per AZ), a default route table, and an Internet Gateway so you can launch instances with internet connectivity immediately.Default VPC and default subnets
In a new AWS account you will see one default VPC per region. Each default VPC:- Uses
172.31.0.0/16(by default) - Contains one default subnet per Availability Zone in the region
- Has an Internet Gateway attached and a default route table that can route
0.0.0.0/0to the IGW (if you configure subnets as public)

VPC components at a glance
| Component | Purpose | AWS resource example |
|---|---|---|
| Subnets | Segment VPC CIDR into AZ-specific ranges | subnet-xxxx |
| Route tables | Control routing for each subnet | rtb-xxxx |
| Security groups | Instance-level firewall (stateful) | sg-xxxx |
| Network ACLs | Subnet-level firewall (stateless) | acl-xxxx |
| Internet access | Enable Internet traffic | Internet Gateway (igw-xxxx) or NAT Gateway |
| Cross-VPC connectivity | Connect VPCs or on-premises networks | VPC Peering, Transit Gateway, VPN Gateway |
Internet access and public subnets
To enable internet connectivity for instances in a VPC you typically need:- An Internet Gateway attached to the VPC.
- A route in the subnet’s route table directing
0.0.0.0/0to the Internet Gateway. - The instance in a subnet that auto-assigns public IPv4 addresses (or an Elastic IP attached).
- Security Group rules permitting the desired inbound/outbound traffic.
Example: Launching an EC2 instance into the default VPC
EC2 is the AWS service for virtual servers. Using the default VPC and default subnet settings lets you get an instance with internet access quickly. Steps in the EC2 Launch Wizard:- Choose an AMI (for example, Amazon Linux 2023)
- Choose an instance type (e.g.,
t2.microfor free tier) - Create or select a key pair for SSH access (this downloads a
.pemfile) - Configure a Security Group (allow port 22 for SSH if you need remote access)
- Select the default VPC and a default subnet (or leave subnet as “No preference”)
- Enable Auto-assign Public IPv4 if you want the instance to receive a public IP

.pem. You’ll use that to SSH into the instance.

0.0.0.0/0), but for production restrict SSH to specific IP ranges.
For production workloads, never leave SSH open to the world. Restrict Security Group inbound rules to specific IP addresses or use a bastion host or AWS Systems Manager Session Manager for secure access.

ACB5) and confirm Auto-assign Public IPv4 is enabled if you want the instance to receive a public IP automatically.

- Instance ID (e.g.,
i-000872d9df41ab19c) - Instance type (e.g.,
t2.micro) - Private IP from the subnet (e.g.,
172.31.6.49) - Public IP if auto-assigned (e.g.,
34.201.6.109)

8.8.8.8 demonstrate that an instance launched into the default VPC (with an Internet Gateway and a public IP) can reach the internet and is reachable from the internet, subject to Security Group rules.
If you’re new to EC2, this example simply shows the default VPC behavior: an Internet Gateway attached to the VPC, a default route table, one default subnet per AZ, and the option to auto-assign public IPv4 addresses so instances can communicate with the internet quickly.
Links and references
- AWS VPC documentation
- AWS EC2 documentation
- Solutions Architect Associate course (example reference)